### [CVE-2024-54499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54499) ![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=visionOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution&color=brightgreen) ### Description A use-after-free issue was addressed with improved memory management. This issue is fixed in visionOS 2.2, tvOS 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing a maliciously crafted image may lead to arbitrary code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds